cephx protocol is vulnerable to authentication bypass attacks. This is because the way signature calculation was handled by cephx authentication protocol. An attacker who has access to ceph cluster network is able to alter the message payload which leads to bypass signature checks done by cephx protocol.
lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
tracker.ceph.com/issues/24837
access.redhat.com/errata/RHSA-2018:2177
access.redhat.com/errata/RHSA-2018:2179
access.redhat.com/errata/RHSA-2018:2261
access.redhat.com/errata/RHSA-2018:2274
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1532645
bugzilla.redhat.com/show_bug.cgi?id=1534657
bugzilla.redhat.com/show_bug.cgi?id=1549004
bugzilla.redhat.com/show_bug.cgi?id=1552202
bugzilla.redhat.com/show_bug.cgi?id=1552509
bugzilla.redhat.com/show_bug.cgi?id=1566016
bugzilla.redhat.com/show_bug.cgi?id=1569694
bugzilla.redhat.com/show_bug.cgi?id=1570597
bugzilla.redhat.com/show_bug.cgi?id=1575024
bugzilla.redhat.com/show_bug.cgi?id=1576057
bugzilla.redhat.com/show_bug.cgi?id=1576861
bugzilla.redhat.com/show_bug.cgi?id=1576908
bugzilla.redhat.com/show_bug.cgi?id=1577846
bugzilla.redhat.com/show_bug.cgi?id=1578509
bugzilla.redhat.com/show_bug.cgi?id=1578572
bugzilla.redhat.com/show_bug.cgi?id=1579039
bugzilla.redhat.com/show_bug.cgi?id=1581403
bugzilla.redhat.com/show_bug.cgi?id=1581573
bugzilla.redhat.com/show_bug.cgi?id=1585748
bugzilla.redhat.com/show_bug.cgi?id=1594974
bugzilla.redhat.com/show_bug.cgi?id=1598185
github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
lists.debian.org/debian-lts-announce/2019/03/msg00017.html
www.debian.org/security/2018/dsa-4339